General
-
Target
Documents389.xlsm
-
Size
57KB
-
Sample
210315-2wwpmllyd6
-
MD5
a3df654767610cdd5ef6d8420c773ede
-
SHA1
99c2321e718c6bec68fd11da84f9d7bfa7f4b4bc
-
SHA256
492a8edc4386bc2194553a437c001e078bf64a90487b1896cfaccb9abfa22c01
-
SHA512
d4df2d9d3743142d7960630a21e705b1acb50c152ab7af6f8fb445504aac8d43bf527023e5a76df95c995d8ee4794a54e27e8e5814e5245a846ab97ddeb29417
Behavioral task
behavioral1
Sample
Documents389.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Documents389.xlsm
Resource
win10v20201028
Malware Config
Extracted
http://xgka03stox03cloeqz.com/index.gif
Targets
-
-
Target
Documents389.xlsm
-
Size
57KB
-
MD5
a3df654767610cdd5ef6d8420c773ede
-
SHA1
99c2321e718c6bec68fd11da84f9d7bfa7f4b4bc
-
SHA256
492a8edc4386bc2194553a437c001e078bf64a90487b1896cfaccb9abfa22c01
-
SHA512
d4df2d9d3743142d7960630a21e705b1acb50c152ab7af6f8fb445504aac8d43bf527023e5a76df95c995d8ee4794a54e27e8e5814e5245a846ab97ddeb29417
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-